skills/yaklang/hack-skills

yaklang/hack-skills

102 skills3.4K total installsGithubGithubGitHub

hack

50

cors-cross-origin-misconfiguration

49

api-authorization-and-bola

49

ssrf-server-side-request-forgery

49

path-traversal-lfi

49

xss-cross-site-scripting

49

xxe-xml-external-entity

49

injection-checking

49

jwt-oauth-token-attacks

49

cmdi-command-injection

49

business-logic-vuln

49

sqli-sql-injection

49

business-logic-vulnerabilities

49

saml-sso-assertion-attacks

49

api-recon-and-docs

49

api-auth-and-jwt-abuse

49

csrf-cross-site-request-forgery

49

idor-broken-object-authorization

49

oauth-oidc-misconfiguration

49

auth-sec

49

authbypass-authentication-flaws

49

ssti-server-side-template-injection

49

api-sec

49

http-parameter-pollution

48

crlf-injection

48

open-redirect

48

web-cache-deception

48

prototype-pollution

48

race-condition

48

recon-and-methodology

48

file-access-vuln

48

graphql-and-hidden-parameters

48

jndi-injection

48

websocket-security

48

recon-for-sec

48

type-juggling

48

request-smuggling

48

xslt-injection

48

clickjacking

47

insecure-source-code-management

47

deserialization-insecure

47

expression-language-injection

47

csv-formula-injection

47

upload-insecure-files

47

dependency-confusion

46

nosql-injection

45

unauthorized-access-common-services

44

linux-lateral-movement

22

csp-bypass-advanced

21

hash-attack-techniques

21

ai-ml-security

21

kubernetes-pentesting

21

network-protocol-attacks

21

sandbox-escape-techniques

21

linux-security-bypass

21

container-escape-techniques

21

llm-prompt-injection

21

anti-debugging-techniques

21

401-403-bypass-techniques

21

dns-rebinding-attacks

21

waf-bypass-techniques

21

http2-specific-attacks

21

arbitrary-write-to-rce

21

linux-privilege-escalation

21

code-obfuscation-deobfuscation

21

email-header-injection

21

symbolic-execution-tools

21

format-string-exploitation

21

smart-contract-vulnerabilities

21

prototype-pollution-advanced

21

classical-cipher-analysis

21

stack-overflow-and-rop

21

tunneling-and-pivoting

20

vm-and-bytecode-reverse

20

active-directory-acl-abuse

20

ntlm-relay-coercion

20

windows-privilege-escalation

20

binary-protection-bypass

20

defi-attack-patterns

20

android-pentesting-tricks

20

lattice-crypto-attacks

20

steganography-techniques

20

memory-forensics-volatility

20

rsa-attack-techniques

20

mobile-ssl-pinning-bypass

20

kernel-exploitation

20

browser-exploitation-v8

20

subdomain-takeover

20

windows-lateral-movement

20

ios-pentesting-tricks

20

heap-exploitation

20

active-directory-kerberos-attacks

20

windows-av-evasion

20

dangling-markup-injection

20

traffic-analysis-pcap

20

active-directory-certificate-services

20

symmetric-cipher-attacks

20

http-host-header-attacks

20

reverse-shell-techniques

19

macos-process-injection

19

macos-security-bypass

19

hackskills-bugbounty-hunter

1